The UO is taking steps to protect campus from ransomware

The UO is taking steps to protect campus from ransomware

However, the evidence is not conclusive.

Security wonks are calling it the biggest cyberattack ever. Brad Smith, Microsoft's top lawyer, criticized US intelligence agencies for "stockpiling" software code that can be used by hackers.

On top of that, critics say, the government didn't notify companies like Microsoft about the vulnerabilities quickly enough. It has been reported that a new ransomware "WannaCry" is spreading widely, RBI advisory to the banks said. American officials said Monday that they had seen the same similarities. "As expected, the attackers have released new variants of the malware". "We are in the second wave", said Matthieu Suiche of Comae Technologies. "However, the reused code appears to have been removed from later versions of WannaCry, which according to Kaspersky gives less weight to the false flag theory".

Chinese media reported that more than 29,000 institutions in the country were infected by the attack, while the Japanese media has claimed that more than 600 companies were hit. Over the weekend, a 22-year-old cybersecurity researcher from England named Marcus Hutchins discovered and inadvertently activated a "kill switch" buried in the malware's code.

Cybersecurity firm Symantec has reported that its software managed to block almost 22 million WannaCry infection attempts across 300,000 endpoints. With the Shadow Brokers' theft of the NSA's cyberweapons. Ashley adds: "In Goa, previously there were two cases where such malicious software hit user demanding ransom but this time it is a massive and a destructive one".

A screenshot shows a WannaCry ransomware demand, provided by cyber security firm Symantec, in Mountain View, California, U.S. May 15, 2017.

With the interests of government agencies and tech firms often at odds, Sims said, a national cybersecurity policy or regulations are needed to set out when notifying companies about a government-identified flaw becomes more important than secretly hanging onto it.

"For Microsoft to say that governments should stop developing exploits to Microsoft products is naive", said Brian Lord, a managing director at PGI Cyber and former deputy director at the Government Communications Headquarters, one of the U.K.'s intelligence agencies.

Still, India has predominantly swerved away from the ransomware causing any major damage, save for a few occurrences in a couple of states in southern India.

Smith compared an equivalent scenario as the USA military having some of its Tomahawk missiles stolen. It might be easier said than done, but we must take all available precautions recommended by experts.

In a blog post, Microsoft admonished governments around the world for keeping software vulnerabilities to themselves, instead of reporting them to the developers.

Microsoft had released a patch in March to counter WannaCrypt ransomware, the company also issued a prompt update on Friday to Windows Defender to detect the WannaCrypt attack.